TECHNOLOGY > > Resilience


« Back to News

2019-01-14

Protecting Your Company’s Data Against Insider Threats

While breaches affecting large organisations get the most publicity, the truth is that no business is immune from the danger of insider threats.

2018-12-14

Top 8 Most Disturbing Data Breaches In 2018

Take a closer look at some of the major 2018 data breaches and discover why they happened. By Marcell Gogan

2018-11-02

Cyber Audits: The Missing Layer in Cybersecurity

Involving the audit team ensures that technology solutions are being properly deployed to address critical strategic security risks.

2018-10-29

Cybersecurity + Blockchain = Big Progress

Blockchain-powered cybersecurity solutions which address a range of pressing challenges are happening now and they’re showing real promise.

2018-10-26

New Partnership To Combine Cyber AI And Forensics

Darktrace and Endace have announced a partnership that combines Darktrace's cyber AI with Endace's forensic capabilities.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-10

Organisations Are Identifying Cyber Threats More Effectively

SANS Threat Research find that most organisations are still reacting to alerts and incidents, instead of proactively them seeking out.

2018-10-01

SMEs Risk Costs Of Up To $2.5m Following A Breach

Cisco say that larger organizations tend to be more resilient than SMEs after an attack as they have more resources for response and recovery.

2018-09-19

A Breakthrough In Video Analytics

New AI-based video analytics technology powers a 20x improvement in central monitoring and video review through cutting-edge collection & analysis.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

PAS Global

PAS Global

PAS provides process safety, cybersecurity, and asset reliability solutions for the energy, process, and power industries worldwide.

HelpSystems

HelpSystems

HelpSystems provides easy-to-use software for cybersecurity, IT operations management and monitoring, business intelligence, and document management.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.